U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

SP 1800-10 (Draft)

Protecting Information and System Integrity in Industrial Control System Environments: Cybersecurity for the Manufacturing Sector

Date Published: September 23, 2021
Comments Due: November 7, 2021 (public comment period is CLOSED)
Email Questions to: manufacturing_nccoe@nist.gov

Author(s)

Michael Powell (NIST), Joseph Brule (NSA), Michael Pease (NIST), Keith Stouffer (NIST), CheeYee Tang (NIST), Timothy Zimmerman (NIST), Chelsea Deane (MITRE), John Hoyt (MITRE), Mary Raguso (MITRE), Aslam Sherule (MITRE), Kangmin Zheng (MITRE), Matthew Zopf (Strativia)

Announcement

Draft NIST SP 1800-10 provides a practical example solution to help manufacturers protect their Industrial Control Systems (ICS) from data integrity attacks. Manufacturers are increasingly relying on ICS to monitor and control physical processes to produce goods for public consumption. ICS has also helped manufacturers boost productivity, but it has made them more vulnerable to cyber threats such as malware, malicious insider activity, even human error.  As technology and operations become more integrated, manufacturers can use this guide to improve their security, reduce the likelihood of data integrity breaches, and better protect their operating systems.  

NOTE: A call for patent claims is included on page iv of this draft (Volume B). For additional information, see the Information Technology Laboratory (ITL) Patent Policy--Inclusion of Patents in ITL Publications.

Abstract

Keywords

manufacturing; industrial control systems; application allowlisting; file integrity checking; user authentication; user authorization; behavioral anomaly detection; remote access; software modification; firmware modification
Control Families

None selected

Documentation

Publication:
Draft SP 1800-10

Supplemental Material:
Project homepage (web)

Document History:
09/23/21: SP 1800-10 (Draft)
03/16/22: SP 1800-10 (Final)